CVE-2017-11173
Publication date 13 July 2017
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
Missing anchor in generated regex for rack-cors before 0.4.1 allows a malicious third-party site to perform CORS requests. If the configuration were intended to allow only the trusted example.com domain name and not the malicious example.net domain name, then example.com.example.net (as well as example.com-example.net) would be inadvertently allowed.
Status
Package | Ubuntu Release | Status |
---|---|---|
ruby-rack-cors | ||
18.04 LTS bionic |
Not affected
|
|
16.04 LTS xenial |
Fixed 0.4.0-1+deb9u1build0.16.04.1
|
|
14.04 LTS trusty | Not in release |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 8.8 · High |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |